US7542569B1 - Security of data connections - Google Patents
Security of data connections Download PDFInfo
- Publication number
- US7542569B1 US7542569B1 US09/571,572 US57157200A US7542569B1 US 7542569 B1 US7542569 B1 US 7542569B1 US 57157200 A US57157200 A US 57157200A US 7542569 B1 US7542569 B1 US 7542569B1
- Authority
- US
- United States
- Prior art keywords
- authentication server
- data network
- subscriber
- network
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- This invention relates to the securing of data connections in data networks connected to telephone networks, especially mobile telecommunication networks.
- FIG. 1 An arrangement for connecting a mobile telecommunication sub-scriber to data services is shown in FIG. 1 .
- the subscriber has connected his computer PC (Personal Computer) to his GSM Mobile Station MS.
- the MS has established a connection to a Base Transceiver Station BTS of the GSM network.
- the BTS forwards the information sent by the MS to the Base Station Controller BSC, which in turn forwards the information to the Mobile Switching Center MSC.
- the MSC is connected to the private data network of the operator using the LAN access unit.
- the Intelligent Data Agent IDA provides intelligence for purposes such as billing and the operation and maintenance of data connections.
- the private network is connected to other networks such as ATM (Asynchronous Trans-fer Mode), X.21, Frame Relay FR and Internet.
- ATM Asynchronous Trans-fer Mode
- X.21 X.21
- Frame Relay FR Frame Relay FR
- Internet Internet
- FIG. 2 An arrangement whereby the subscriber uses the services provided by a server in another private network is shown in FIG. 2 .
- the second private network is connected to the operator network via an arbitrating network or a plurality of arbitrating networks.
- the private network is a private network of a company, for example, the security of the data connection from the subscriber to the server must be enforced.
- the GSM system provides authentication and secure data transmission between the mobile subscriber MS and the mobile switching center MSC.
- the authentication process is based on a challenge-response process, whereby the network sends the Subscriber Identity Module SIM installed in the mobile station a random challenge.
- the mobile station replies with a response according to calculations based on the random challenge and a secret key known only by the autheritication center of the network and the SIM.
- the response of the random challenge and the secret key is calculated in the authentication center also. If the responses calculated by the SIM and the authentication center are identical, mobile sub-scriber authenticity has been established by the authentication process.
- Data transmission between the base station and the mobile station is encrypted with a secret encryption key calculated on the basis of the random challenge and the secret key.
- This method of secret key encryption which is also called the symmetrical encryption method, will be described in more detail later.
- the connection between the subscriber and the server is insecure if no authentication and encryption are used over the arbitrating network.
- FIGS. 3 and 4 of the attached drawings show block diagrams of two known encryption algorithms which can be used to protect a transmission: a symmetric and an asymmetric algorithm.
- FIG. 3 shows a symmetric encryption process based on a secret key shared between the participants.
- the message to be sent to party B is encrypted with the shared secret key.
- the message is sent over a transmission route in encrypted form.
- the receiving party B decrypts the encrypted message with the same secret key K to retrieve the original message.
- An intruder eavesdropping the transmission needs to learn the secret key in order to be able to read and understand the encrypted message which has been transmitted.
- Another alternative is to find a weakness in the algorithm itself. Therefore, it is preferable to use publicly analyzed algorithms, such as the DES (Data Encryption Standard) algorithm.
- C is the encrypted message
- M is the message in plain text
- E K is the encryption with key K
- D K is the decryption with key K
- FIG. 4 shows a public key encryption process which is an asymmetric approach.
- This algorithm is based on two keys: a public key and a private key. These two keys are related in such a manner that a message encrypted with a public key can only be decrypted with the corresponding private key and vice versa.
- the public key can be easily calculated by using the corresponding private key. However, it is computationally unfeasible to calculate a private key based on the corresponding public key.
- a message is encrypted at party A's end with the public key of the intended receiver, that is party B.
- the encrypted message is transmitted over a trans-mission line to party B's end, where it is decrypted with the corresponding party B's private key and the original message is retrieved.
- publicly analyzed algorithms such as the RSA (River-Shamir-Adleman) algorithm are preferred.
- C is the encrypted message
- M is the message in plain text
- E B + is encryption with the receiver's public key K B +
- D B ⁇ is decryption with the receiver's private key K B ⁇ . Due to the properties of the encryption function E, it is computationally unfeasible to decrypt a message encrypted using the public key of the recipient if the private key is not known.
- asymmetric keys are usually much longer than symmetric keys, the asymmetric algorithm requires much more processing capacity.
- asymmetric algorithms are unsuitable for encrypting large amounts of data, since the public key process may be too slow for networks enabling very high transmission speeds.
- Hybrid cryptography uses both the above algorithms together. For example, only session keys are exchanged using the public key algorithm, and the rest of the communication is encrypted applying the symmetric method.
- the procedure for generating a digital signature is shown in FIG. 5 .
- the sender calculates from the message a message digest using a cryptographically strong one-way hash function.
- the message digest is some-what analogous to the error checking codes widely used in telecommunications. But contrary to the error checking codes, it is believed to be computationally unfeasible to substitute one message with another so as to produce an identical message digest.
- the message digest is encrypted using the private key of the sender and the encrypted message digest is used as a digital signature.
- the digital signature is then sent to the receiver together with the message.
- the procedure for the receiving party to verify a digital signature is shown in FIG. 6 .
- the receiver calculates the message digest of the message using the message digest algorithm. If no alterations have occurred in the message, the resulting message digest is identical to the message digest calculated by the sender. On the other hand, due to the properties of the algorithm, it would be computationally unfeasible for an intruder to substitute the message with another that would produce an identical message digest.
- the received digital signature is the message digest encrypted by using the private key of the sender.
- the message digest can thus be retrieved by decrypting the digital signature using the public key of the sender, which is known by the receiver. If decryption has taken place using the private key which corresponds to the public key of the assumed sender, the recovered message digest will be identical to the message digest calculated by the sender. This in turn is identical to the message digest calculated by the receiver only when no changes in the message have occurred. Thus, if the comparison shows that the message digest calculated from the received message and the message digest calculated by decrypting the digital signature are identical, it can be deduced that the message has not been altered and that it was sent by the claimed sender.
- message authentication can be provided using a Message Authentication Code MAC similar to the digital signature.
- K is the key
- M is the message
- H is a hash function.
- the input cannot be deduced from the output.
- MAC is attached to a message, the message cannot be corrupted or impersonated.
- the receiving party calculates MAC using the received message and the same hash function and key as the transmitting party and then compares this calculated MAC to the MAC attached to the message in order to verify it.
- authenticity code is used as a common name for all codes providing a message with authenticity and integrity, i.e. for both the digital signatures and message authentication codes.
- Prior art provides a means for secure data connection from the subscriber to the GSM network as well as from the private network of the operator to another private network such as a company network, as illustrated in FIG. 7 .
- the operator network can be used by a plurality of users not all of whom are entitled to the services of the company network.
- their access to the company network must be denied by using a password based authentication procedure between the subscriber and the company network. This is inconvenient because the password must be transferred whenever the connection is established.
- the objective of the present invention is to solve the above problem. This objective is achieved by using the method and apparatus defined in the independent claims.
- a trusted operator network connected to the telephone system comprises an authentication server.
- a second private network which is here termed the company network, comprises a similar authentication server.
- the authentication procedure is initiated when the subscriber requests a service provided by a server in the company network.
- the authentication server AS_O of the operator network signs a authenticated identification of the subscriber digitally using its own private key and forms a message comprising the identification and the signature.
- An example of identification suitable for the purpose of identifying the subscriber is the MSISDN (Mobile Subscriber Integrated Services Digital Network) number of the subscriber.
- the signature establishes authenticity the message.
- the message is additionally encrypted using the public key of the authentication server AS_C of the company network.
- the encryption pre-vents an eavesdropper from identifying the user requesting a service.
- the signed and encrypted message is sent to the authentication server of the company network via the arbitrating network.
- the authentication server of the company network receives the message and verifies the signature in order to establish the authenticity of the message. If encryption has been used, the message is decrypted using the private key of AS_C.
- the authentication server checks the subscriber's rights to the data service, and if the subscriber is entitled to the service, it generates the session key to be used in the connection.
- a message comprising the session key is transferred to the operator network preferably encrypted using the public key of AS_O and preferably signed using the private key of AS_C. Additionally, the session key is transferred to the server.
- AS_O receives the encrypted and signed session key, decrypts the key using its own private key and verifies the authenticity of the key using the public key of AS_C. If the authentication procedure is successful, the session key is transferred to the network element handling the encryption of the data traffic, and the data traffic begins.
- FIG. 1 shows a mobile telecommunication system connected to data networks
- FIG. 2 shows two private data networks connected via arbitrating networks
- FIG. 3 shows a symmetric encryption procedure
- FIG. 4 shows an encryption procedure based on a public key
- FIG. 5 shows the generation of a digital signature
- FIG. 6 shows the verification of a digital signature
- FIG. 7 shows an authentication method
- FIG. 8 shows two private data networks connected via arbitrating networks
- FIG. 9 shows an authentication procedure
- FIG. 10 shows an encryption procedure
- FIG. 11 shows forwarded authentication
- FIG. 12 shows secure data transfer
- FIG. 13 shows the authentication server of the operator network
- FIG. 14 shows the authentication server of the company network.
- FIG. 8 shows two networks, an operator network and a company network, which are connected to each other via an arbitrating network.
- the operator network is connected to the user via a telephone system such as the GSM system.
- authentication servers have been added.
- the servers are called AS_O (Authentication Server in the Operator network) and AS_C (Authentication Server in the Company network).
- AS_O Authentication Server in the Operator network
- AS_C Authentication Server in the Company network
- the authentication servers are connected to key databases.
- the key database connected to the authentication server AS_O of the operator network contains the following information:
- the key database connected to the authentication server AS_C of the company network contains the following information:
- the authentication procedure is shown in FIG. 9 .
- the procedure is triggered by a request for an incoming data call.
- the MSISDN number of the calling subscriber is forwarded to the IDA.
- the IDA establishes the identity of the server to whose services the subscriber requests access as well as the identity of the authentication server AS_C of the company network in which the server is located. This information is then forwarded to the authentication server AS_O at stage 11 .
- An example of a public key encryption method suitable for use in this invention is the well known RSA algorithm.
- the digital signature is calculated only on the basis of the MSISDN number, all the messages comprising the same MSISDN number are identical. This makes it possible to track the traffic of a subscriber. To overcome this problem, it is preferable that the digital signature not be calculated on the basis of the MSISDN number only, but that the MSISDN number is signed together with a random number. Thus, the messages identifying the same subscriber are not identical, making tracking of the subscriber impossible or at least much more difficult.
- AS_C receives the signed and encrypted message at stage C 01 .
- it decrypts the message using its own private key stored in its key database.
- AS_C verifies the digital signature using the public key of AS_O in order to establish the authenticity of the message.
- AS_C now holds the identification of the subscriber requesting the data service and has established that the request was received from a trusted network, i.e. the operator network.
- AS_C consults its database and checks the access permission attached to that subscriber, i.e. that MSISDN number.
- a session key for this particular session is generated at stage C 05 .
- the key is sent to the server, which receives it at stage S 1 .
- the public key algorithm together with a digital signature is used.
- the digital signature is generated using the private key of AS_C at stage P 06 .
- the session key is preferably signed together with a random number.
- the message and the digital signature are then encrypted using the public key of AS_O at stage P 07 .
- the signed and encrypted message is then sent to AS_O via the arbitrating network at stage P 08 .
- AS_O receives the signed and encrypted message containing the session key at stage O 11 . It decrypts the message using its own private key at stage O 12 . Having now retrieved the session key in plain text and the digital signature, AS_O verifies the signature using the public key of AS_C at stage O 13 . This verification proves the authenticity of the message. If the verification shows that the session key was sent by the claimed sender, i.e. AS_C, AS_O forwards the session key to the IDA at stage O 13 . The IDA receives the key at stage 12 .
- the session key is now held by both the server providing the requested data service and the IDA.
- the actual data transmission can now take place.
- the data is transferred over the arbitrating network in encrypted form.
- the encryption procedure is shown in FIG. 10 .
- the data is first sent from the mobile station of the subscriber to the mobile switching center MSC using the GSM service and its data security functions.
- the MSC forwards the data DATAL sent by the mobile station to the IDA.
- the IDA receives the data and encrypts it using a symmetric encryption method and the session key KEY received from AS_O.
- An example of a symmetric encryption algorithm suitable for use is the well known DES algorithm.
- the encrypted message E 1 is sent to the server over the arbitrating network.
- the server receives the encrypted message and retrieves the sent data DATAL by decrypting the encrypted message E 1 using the session key KEY which it received from AS_C during the authentication procedure at stage S 1 of FIG. 9 .
- the retrieved data is forwarded to the server application.
- the encryption algorithm running at the server encrypts the data using the session key KEY.
- the encrypted data message is then sent to the IDA at the operator network.
- the IDA of the operator network receives the message and decrypts it using the session key. Now having the message in plain text, the IDA sends it to the subscriber via the mobile switching center.
- the process of forwarded authentication is shown in FIG. 11 .
- the leg between the mobile subscriber MS and the mobile switching center MSC is authenticated by means of the GSM authentication procedure. With the help of this procedure, the mobile switching center can establish that the identifying information provided by the mobile subscriber is correct, i.e. truly own MSISDN number.
- AS_O is connected to the MSC via the trusted private data network of the operator. Therefore, AS_O can ascertain that the sub-scriber is indeed identifying himself correctly.
- the AS_O sends AS_C the MSISDN number over the arbitrating network in an encrypted and signed form.
- the encryption ensures that the message can only be read by the recipient intended, i.e. the trusted network element AS_C of the company network.
- the signature authenticates AS_O to AS_C.
- AS_C In response to successful verification of the signature of the message AS_C thus establishes that the message is from a trusted network element AS_O. Therefore, also the identity of the subscriber requesting the service can be trusted.
- AS_C Both AS_C and the server are in the same company network, and the network elements inside the company network trust each other. Therefore, also the server can be assured that the subscriber is revealing his true identity.
- the preferred embodiment of the invention provides authentication of AS_C of the company network to AS_O of the operator network. This is achieved by using the public key encryption method when sending the message containing information of the subscriber identity from AS_O to AS_C. In addition or alternatively authenticity is verified by means of the digital signature of the message containing the session key and sent from AS_C to AS_O. If the operator network is authenticated to the MS, the authenticity of AS_C is also forwarded to the subscriber. This means that the company network can be sure of the identity of the subscriber and the sub-scriber can be sure of the identity of the company network.
- the basis for the security of data transfer can be studied with reference to FIG. 12 .
- an encryption method according to GSM specifications is used on the leg between the mobile station MS and the base station BTS. From BTS to the IDA, the transmission path is trusted. On the leg from the IDA over the arbitrating network to the server, the symmetric encryption method is used.
- the encryption chain is similar in both transmission directions, i.e. from the MS to the server and vice versa. Thus, end to end connection between the mobile station and the server is secure.
- FIGS. 13 and 14 depict the functionalities of the authentication center AS_O in the operator network.
- the server has
- mapping means and the signing means need information about the subscriber's services and the private key of the server, which can be found in the database DB.
- encryption means responsive to the signing means is also needed. It must be noted that the order of signing and encryption may vary.
- the encryption means requires the public key of the authentication server of the company network, and is therefore connected to the database DB.
- the authentication server has also second receiving means for receiving an encrypted session key from the authentication server of the company network, and decrypting means responsive to the second receiving means for decrypting the encrypted session key. If the authentication server of the company network signs the session keys according to the preferred embodiment, the authentication server of the operator network must in addition have verifying means responsive to the second receiving means for verifying the a digital signature calculated from the session key.
- the means needed in the authentication server of the company network are shown in FIG. 14 .
- the authentication server has
- the authentication server has in addition a means responsive to the receiving means for decrypting the subscriber identity using the private key of the authentication server. Further, if the authentication server of the company network is to sign the session key before sending it to the authentication server of the operator network, the authentication server must in addition have a signing means responsive to the generating means for signing the session key using the private key of the authentication server.
- identification other than a MSISDN number can be used when contacting the company network.
- company network is only used for clarity, as it can be any private network, not necessarily a closed data network of a company. It can as well be a private network operated by a network operator and requesting user authentication, for example. This can be implemented by determining the identification used in the company network on the basis of the MSISDN number of the subscriber. The mapping can be done in AS_O, for example.
- the order of signature generation and encryption may also differ from the order used in the examples. That is, the messages may be encrypted first and then signed.
- the authentication server, the IDA and the LAN access unit were described as separate network elements. However, this is not crucial for the invention, and a plurality of these functionalities may be implemented in a single network element. Also, one functionality may be distributed over a plurality of network elements.
- the signature can be sent in plain text. In this embodiment the message is encrypted and the signature is attached to the encrypted message without encryption.
- the invention is not limited to a GSM system the system used in the examples for this application, but the invention can be used, with any telecommunication system in which sub-scribers are authenticated securely and which is connected to a private network.
- a telephone system is the fixed telephone system.
- GPRS General Packet Radio System
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Communication Control (AREA)
- Nitrogen And Oxygen Or Sulfur-Condensed Heterocyclic Ring Systems (AREA)
- Finger-Pressure Massage (AREA)
- Emergency Protection Circuit Devices (AREA)
Abstract
Description
C=E K(M) and
M=D K(C),
C=E B +(M) and
M=D B −(C),
MAC=H(K,M,K),
-
- public keys of the authentication servers, such as AS_C of the company networks the operator network can be connected to and
- both the public and the private key of AS_O.
-
- the public key AS_O.
- both the public and the private key of AS_C.
-
- 1. generates a digital signature based on the MSISDN number with its own private key (stage O01),
- 2. encrypts the MSISDN number and the digital signature using a public key method and the public key of AS_C stored in the key database (stage O02), and
- 3. sends the encrypted MSISDN number and the signature to AS_C (stage O03).
-
- receiving means for receiving the subscriber identity from the telecommunication network,
- determining means responsive to the receiving means for determining the identity of a second authentication server on the basis of the identity of the subscriber,
- signing means responsive to the receiving means for generating a digital signature, and
- sending means responsive to the receiving means, the determining means and the signing means and having the functionality of sending the identity and the signature to the authentication server of the company network.
-
- receiving means for receiving a subscriber identity and a digital signature calculated from the subscriber identity and the identification of a service requested by the subscriber from the authentication server of the operator network,
- verification means responsive to the receiving means for verifying the digital signature,
- checking means responsive to the receiving means for checking whether the subscriber is entitled to the requested service,
- generation means responsive to the checking means for generating a session key,
- encryption means responsive to the generation means for encrypting the session key, and
- sending means responsive to the encryption means for sending the encrypted message to another authentication server.
Claims (29)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI974341A FI974341A (en) | 1997-11-26 | 1997-11-26 | Data protection for data connections |
PCT/FI1998/000928 WO1999027678A2 (en) | 1997-11-26 | 1998-11-26 | Security of data connections |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FI1998/000928 Continuation WO1999027678A2 (en) | 1997-11-26 | 1998-11-26 | Security of data connections |
Publications (1)
Publication Number | Publication Date |
---|---|
US7542569B1 true US7542569B1 (en) | 2009-06-02 |
Family
ID=8550015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/571,572 Expired - Fee Related US7542569B1 (en) | 1997-11-26 | 2000-05-17 | Security of data connections |
Country Status (10)
Country | Link |
---|---|
US (1) | US7542569B1 (en) |
EP (1) | EP1025675B1 (en) |
JP (1) | JP2001524777A (en) |
CN (1) | CN1280727A (en) |
AT (1) | ATE288159T1 (en) |
AU (1) | AU1240499A (en) |
CA (1) | CA2310329A1 (en) |
DE (1) | DE69828809T2 (en) |
FI (1) | FI974341A (en) |
WO (1) | WO1999027678A2 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050147249A1 (en) * | 2002-03-08 | 2005-07-07 | Carl Gustavsson | Security protection for data communication |
US20060140350A1 (en) * | 1999-03-31 | 2006-06-29 | Jorasch James A | Method and apparatus for monitoring telephone status |
US20150347770A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Context Based Data Access Control |
CN105635139A (en) * | 2015-12-31 | 2016-06-01 | 深圳市安之天信息技术有限公司 | Anti-overflow-attack document security operation and analysis method and system |
WO2018017013A1 (en) * | 2016-07-22 | 2018-01-25 | Huawei International Pte. Ltd. | A method for unified network and service authentication based on id-based cryptography |
CN110062382A (en) * | 2014-07-31 | 2019-07-26 | 阿里巴巴集团控股有限公司 | A kind of auth method, client, trunking and server |
US11425561B2 (en) * | 2017-09-15 | 2022-08-23 | Orange | Access to a service with authentication based on a mobile terminal |
CN115426138A (en) * | 2022-08-14 | 2022-12-02 | 兰州理工大学 | LonTalk-SA protocol authentication method |
US11877218B1 (en) | 2021-07-13 | 2024-01-16 | T-Mobile Usa, Inc. | Multi-factor authentication using biometric and subscriber data systems and methods |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI974341A (en) * | 1997-11-26 | 1999-05-27 | Nokia Telecommunications Oy | Data protection for data connections |
CA2255285C (en) * | 1998-12-04 | 2009-10-13 | Certicom Corp. | Enhanced subscriber authentication protocol |
KR20010004791A (en) * | 1999-06-29 | 2001-01-15 | 윤종용 | Apparatus for securing user's informaton and method thereof in mobile communication system connecting with internet |
JP2001203688A (en) * | 2000-01-24 | 2001-07-27 | Kyocera Corp | Voice communication terminal |
CA2391049A1 (en) * | 2000-09-08 | 2002-03-14 | Rivenet.Com, Inc. | System and method for encrypted message interchange |
GB2369530A (en) * | 2000-11-24 | 2002-05-29 | Ericsson Telefon Ab L M | IP security connections for wireless authentication |
JP2004532590A (en) | 2001-06-12 | 2004-10-21 | リサーチ イン モーション リミテッド | System and method for managing and sending certificates |
AU2002317062A1 (en) | 2001-06-12 | 2002-12-23 | Research In Motion Limited | Method for processing encoded messages for exchange with a mobile data communication device |
WO2002101605A2 (en) | 2001-06-12 | 2002-12-19 | Research In Motion Limited | System and method for compressing secure e-mail for exchange with a mobile data communication device |
EP1410601B1 (en) * | 2001-07-10 | 2017-02-08 | BlackBerry Limited | System and method for secure message key caching in a mobile communication device |
WO2003015367A2 (en) | 2001-08-06 | 2003-02-20 | Research In Motion Limited | System and method for processing encoded messages |
DE10213073B4 (en) * | 2002-03-18 | 2006-11-23 | Siemens Ag | Method for billing a paid use of data and data transmission network |
DE10213072A1 (en) | 2002-03-18 | 2003-10-09 | Siemens Ag | Method for operating a billing system assigned to a mobile radio network for billing a fee-based use of data and data transmission network |
WO2003092218A1 (en) * | 2002-04-26 | 2003-11-06 | Thomson Licensing S.A. | Transitive authentication authorization accounting in interworking between access networks |
US20030204724A1 (en) * | 2002-04-30 | 2003-10-30 | Microsoft Corporation | Methods for remotely changing a communications password |
CN1659558B (en) | 2002-06-06 | 2010-09-22 | 汤姆森特许公司 | Broker-based interworking using hierarchical certificates |
US7221757B2 (en) | 2002-08-15 | 2007-05-22 | Opentv, Inc. | Method and system for accelerated data encryption |
AU2002323203B2 (en) * | 2002-08-15 | 2007-12-06 | Opentv, Inc. | Method and system for accelerated data encryption |
US7272716B2 (en) | 2002-08-30 | 2007-09-18 | Sap Aktiengesellschaft | Enterprise secure messaging architecture |
JP4647903B2 (en) * | 2003-07-09 | 2011-03-09 | 株式会社東芝 | Information communication apparatus, communication system, and data transmission control program |
CN1300976C (en) * | 2004-01-16 | 2007-02-14 | 华为技术有限公司 | Method for obtaining user identification information for network application entity |
US9094429B2 (en) | 2004-08-10 | 2015-07-28 | Blackberry Limited | Server verification of secure electronic messages |
KR100636318B1 (en) * | 2004-09-07 | 2006-10-18 | 삼성전자주식회사 | Method and system for authentication of address ownership using care of address binding protocol |
JP2006079213A (en) | 2004-09-07 | 2006-03-23 | Ntt Docomo Inc | Relay device, authentication server, and authentication method |
CN1893355B (en) * | 2005-07-05 | 2012-10-10 | 淘宝控股有限公司 | Method and system for identifying identity of network user end |
US7953971B2 (en) | 2005-10-27 | 2011-05-31 | Research In Motion Limited | Synchronizing certificates between a device and server |
CN1753569B (en) * | 2005-11-02 | 2010-05-12 | 中国移动通信集团公司 | System and method for treating mobile communication data business based on false code |
US8191105B2 (en) | 2005-11-18 | 2012-05-29 | Research In Motion Limited | System and method for handling electronic messages |
US7840207B2 (en) | 2005-11-30 | 2010-11-23 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US8355701B2 (en) | 2005-11-30 | 2013-01-15 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US7814161B2 (en) | 2006-06-23 | 2010-10-12 | Research In Motion Limited | System and method for handling electronic mail mismatches |
CN101150406B (en) * | 2006-09-18 | 2011-06-08 | 华为技术有限公司 | Network device authentication method and system and relay forward device based on 802.1x protocol |
JP4882110B2 (en) * | 2007-08-09 | 2012-02-22 | Necアクセステクニカ株式会社 | Telephone system, telephone apparatus, telephone communication method, and program thereof |
US7949355B2 (en) | 2007-09-04 | 2011-05-24 | Research In Motion Limited | System and method for processing attachments to messages sent to a mobile device |
CN101420687B (en) * | 2007-10-24 | 2010-07-14 | 中兴通讯股份有限公司 | Identity verification method based on mobile terminal payment |
DE102011102489A1 (en) * | 2011-05-24 | 2012-11-29 | Vodafone Holding Gmbh | Method and device for providing an identification identifier of an electronic terminal |
CN106559402B (en) * | 2015-09-30 | 2020-06-02 | 展讯通信(上海)有限公司 | User terminal and identity authentication method and device for encrypted voice telephone service thereof |
Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4262329A (en) * | 1978-03-27 | 1981-04-14 | Computation Planning, Inc. | Security system for data processing |
EP0481121A1 (en) | 1990-10-19 | 1992-04-22 | Siemens Aktiengesellschaft | Authentication for enciphered communication |
US5204902A (en) * | 1991-09-13 | 1993-04-20 | At&T Bell Laboratories | Cellular telephony authentication arrangement |
US5249230A (en) * | 1991-11-21 | 1993-09-28 | Motorola, Inc. | Authentication system |
US5341499A (en) * | 1992-04-02 | 1994-08-23 | International Business Machines Corporation | Method and apparatus for processing multiple file system server requests in a data processing network |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5377267A (en) * | 1992-08-19 | 1994-12-27 | Nippon Telegraph And Telephone Corporation | Method of authentication with improved security for secrecy of authentication key |
GB2279540A (en) | 1993-06-10 | 1995-01-04 | Kokusai Denshin Denwa Co Ltd | Mutual authentication / cipher key delivery system |
US5386468A (en) * | 1992-09-14 | 1995-01-31 | Fujitsu Limited | Method of registering identification number in personal communication terminal |
WO1995023473A2 (en) | 1994-02-16 | 1995-08-31 | Telecom Finland Oy | Method to identify clients and method for using a teleterminal device |
GB2287160A (en) | 1994-03-03 | 1995-09-06 | Fujitsu Ltd | Cryptoinformation reapeater connected to subscriber terminals and storing a common secret key and public keys |
US5457737A (en) * | 1993-12-28 | 1995-10-10 | At&T Corp. | Methods and apparatus to verify the identity of a cellular mobile phone |
WO1996005675A1 (en) | 1994-08-17 | 1996-02-22 | British Telecommunications Public Limited Company | User authentication in a communications network |
US5546463A (en) * | 1994-07-12 | 1996-08-13 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
EP0739105A1 (en) | 1995-04-21 | 1996-10-23 | Certicom Corp. | Method for signature and session key generation |
WO1997024831A1 (en) | 1995-12-29 | 1997-07-10 | Mci Communications Corporation | Multiple cryptographic key distribution |
US5706347A (en) * | 1995-11-03 | 1998-01-06 | International Business Machines Corporation | Method and system for authenticating a computer network node |
US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
WO1999027678A2 (en) * | 1997-11-26 | 1999-06-03 | Nokia Networks Oy | Security of data connections |
US6061796A (en) * | 1997-08-26 | 2000-05-09 | V-One Corporation | Multi-access virtual private network |
US6134432A (en) * | 1997-06-17 | 2000-10-17 | Bulletin.Net, Inc. | System and process for allowing wireless messaging |
US6285991B1 (en) * | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system |
US6408175B1 (en) * | 1998-03-03 | 2002-06-18 | Lg Information & Communications Ltd. | Method of managing mobile station operational parameters |
US6532290B1 (en) * | 1999-02-26 | 2003-03-11 | Ericsson Inc. | Authentication methods |
EP1331614A2 (en) * | 2001-12-12 | 2003-07-30 | Setec Oy | Method of loading a secret key of one device into another device |
US6829356B1 (en) * | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20080109448A1 (en) * | 2006-11-06 | 2008-05-08 | Messageone, Inc. | System and Method for Managing Data Across Multiple Environments |
US20080294891A1 (en) * | 2006-03-10 | 2008-11-27 | Motorola, Inc. | Method for Authenticating a Mobile Node in a Communication Network |
US7480939B1 (en) * | 2000-04-28 | 2009-01-20 | 3Com Corporation | Enhancement to authentication protocol that uses a key lease |
US7480801B2 (en) * | 2002-01-24 | 2009-01-20 | Siemens Aktiengesellschaft | Method for securing data traffic in a mobile network environment |
-
1997
- 1997-11-26 FI FI974341A patent/FI974341A/en unknown
-
1998
- 1998-11-26 DE DE69828809T patent/DE69828809T2/en not_active Expired - Lifetime
- 1998-11-26 JP JP2000522701A patent/JP2001524777A/en active Pending
- 1998-11-26 AU AU12404/99A patent/AU1240499A/en not_active Abandoned
- 1998-11-26 CA CA002310329A patent/CA2310329A1/en not_active Abandoned
- 1998-11-26 EP EP98955634A patent/EP1025675B1/en not_active Expired - Lifetime
- 1998-11-26 WO PCT/FI1998/000928 patent/WO1999027678A2/en active IP Right Grant
- 1998-11-26 AT AT98955634T patent/ATE288159T1/en not_active IP Right Cessation
- 1998-11-26 CN CN98811612A patent/CN1280727A/en active Pending
-
2000
- 2000-05-17 US US09/571,572 patent/US7542569B1/en not_active Expired - Fee Related
Patent Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4262329A (en) * | 1978-03-27 | 1981-04-14 | Computation Planning, Inc. | Security system for data processing |
EP0481121A1 (en) | 1990-10-19 | 1992-04-22 | Siemens Aktiengesellschaft | Authentication for enciphered communication |
US5204902A (en) * | 1991-09-13 | 1993-04-20 | At&T Bell Laboratories | Cellular telephony authentication arrangement |
US5249230A (en) * | 1991-11-21 | 1993-09-28 | Motorola, Inc. | Authentication system |
US5341499A (en) * | 1992-04-02 | 1994-08-23 | International Business Machines Corporation | Method and apparatus for processing multiple file system server requests in a data processing network |
US5377267A (en) * | 1992-08-19 | 1994-12-27 | Nippon Telegraph And Telephone Corporation | Method of authentication with improved security for secrecy of authentication key |
US5386468A (en) * | 1992-09-14 | 1995-01-31 | Fujitsu Limited | Method of registering identification number in personal communication terminal |
GB2279540A (en) | 1993-06-10 | 1995-01-04 | Kokusai Denshin Denwa Co Ltd | Mutual authentication / cipher key delivery system |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5457737A (en) * | 1993-12-28 | 1995-10-10 | At&T Corp. | Methods and apparatus to verify the identity of a cellular mobile phone |
WO1995023473A2 (en) | 1994-02-16 | 1995-08-31 | Telecom Finland Oy | Method to identify clients and method for using a teleterminal device |
GB2287160A (en) | 1994-03-03 | 1995-09-06 | Fujitsu Ltd | Cryptoinformation reapeater connected to subscriber terminals and storing a common secret key and public keys |
US5546463A (en) * | 1994-07-12 | 1996-08-13 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
WO1996005675A1 (en) | 1994-08-17 | 1996-02-22 | British Telecommunications Public Limited Company | User authentication in a communications network |
EP0739105A1 (en) | 1995-04-21 | 1996-10-23 | Certicom Corp. | Method for signature and session key generation |
US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
US5706347A (en) * | 1995-11-03 | 1998-01-06 | International Business Machines Corporation | Method and system for authenticating a computer network node |
WO1997024831A1 (en) | 1995-12-29 | 1997-07-10 | Mci Communications Corporation | Multiple cryptographic key distribution |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US6285991B1 (en) * | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system |
US6134432A (en) * | 1997-06-17 | 2000-10-17 | Bulletin.Net, Inc. | System and process for allowing wireless messaging |
US6061796A (en) * | 1997-08-26 | 2000-05-09 | V-One Corporation | Multi-access virtual private network |
WO1999027678A2 (en) * | 1997-11-26 | 1999-06-03 | Nokia Networks Oy | Security of data connections |
US6408175B1 (en) * | 1998-03-03 | 2002-06-18 | Lg Information & Communications Ltd. | Method of managing mobile station operational parameters |
US6532290B1 (en) * | 1999-02-26 | 2003-03-11 | Ericsson Inc. | Authentication methods |
US6829356B1 (en) * | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US7480939B1 (en) * | 2000-04-28 | 2009-01-20 | 3Com Corporation | Enhancement to authentication protocol that uses a key lease |
EP1331614A2 (en) * | 2001-12-12 | 2003-07-30 | Setec Oy | Method of loading a secret key of one device into another device |
US7480801B2 (en) * | 2002-01-24 | 2009-01-20 | Siemens Aktiengesellschaft | Method for securing data traffic in a mobile network environment |
US20080294891A1 (en) * | 2006-03-10 | 2008-11-27 | Motorola, Inc. | Method for Authenticating a Mobile Node in a Communication Network |
US20080109448A1 (en) * | 2006-11-06 | 2008-05-08 | Messageone, Inc. | System and Method for Managing Data Across Multiple Environments |
Non-Patent Citations (6)
Title |
---|
Bhargavan et al, Verifying Policy-Based Web Services Security, 2008, ACM, pp. 1-59. * |
Elkamshoushy et al, New Proxy Signcryption Scheme with DSA Verifier, 2006, IEEE, pp. 1-8. * |
Harn et al, On the Security of Wireless Network Access with Enhancements, 2003, ACM, pp. 88-95. * |
Lee et al, Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography, 2003, IEEE, pp. 597-603. * |
Newton, Harry, Newton's Telecom Dictionary, 1998, 14th updated and expanded edition, pp. 213, 720, 748. * |
Schneier, Bruce, Applied Cryptography, 1996, John Wiley & Sons, Inc., Second Edition, pp. 31, 37, 53, 54. * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060140350A1 (en) * | 1999-03-31 | 2006-06-29 | Jorasch James A | Method and apparatus for monitoring telephone status |
US20060203968A1 (en) * | 1999-03-31 | 2006-09-14 | Jorasch James A | Method and apparatus for monitoring telephone status |
US20060203970A1 (en) * | 1999-03-31 | 2006-09-14 | Jorasch James A | Method and apparatus for monitoring telephone status |
US20060203969A1 (en) * | 1999-03-31 | 2006-09-14 | Jorasch James A | Method and apparatus for monitoring telephone status |
US8027448B2 (en) | 1999-03-31 | 2011-09-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for monitoring telephone status |
US8204199B2 (en) * | 1999-03-31 | 2012-06-19 | Hewlett-Packard Development Company, L.P. | Method and apparatus for monitoring device status |
US9154619B2 (en) | 1999-03-31 | 2015-10-06 | Qualcomm Incorporated | Method and apparatus for monitoring telephone status |
US8130953B2 (en) * | 2002-03-08 | 2012-03-06 | Sony Ericsson Mobile Communications Ab | Security protection for data communication |
US20050147249A1 (en) * | 2002-03-08 | 2005-07-07 | Carl Gustavsson | Security protection for data communication |
US9558363B2 (en) * | 2014-05-30 | 2017-01-31 | Apple Inc. | Systems and methods of context based data access control of encrypted files |
US20150347770A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Context Based Data Access Control |
CN110062382A (en) * | 2014-07-31 | 2019-07-26 | 阿里巴巴集团控股有限公司 | A kind of auth method, client, trunking and server |
CN105635139B (en) * | 2015-12-31 | 2019-04-05 | 深圳市安之天信息技术有限公司 | A kind of method and system of the document security operation and analysis of anti-spilled attack |
CN105635139A (en) * | 2015-12-31 | 2016-06-01 | 深圳市安之天信息技术有限公司 | Anti-overflow-attack document security operation and analysis method and system |
WO2018017013A1 (en) * | 2016-07-22 | 2018-01-25 | Huawei International Pte. Ltd. | A method for unified network and service authentication based on id-based cryptography |
CN109075973A (en) * | 2016-07-22 | 2018-12-21 | 华为国际有限公司 | A kind of method that use is carried out network and serviced unified certification based on the cryptography of ID |
US11044084B2 (en) * | 2016-07-22 | 2021-06-22 | Huawei International Pte. Ltd. | Method for unified network and service authentication based on ID-based cryptography |
CN109075973B (en) * | 2016-07-22 | 2022-04-05 | 华为国际有限公司 | Method for carrying out unified authentication on network and service by using ID-based cryptography |
US11425561B2 (en) * | 2017-09-15 | 2022-08-23 | Orange | Access to a service with authentication based on a mobile terminal |
US11877218B1 (en) | 2021-07-13 | 2024-01-16 | T-Mobile Usa, Inc. | Multi-factor authentication using biometric and subscriber data systems and methods |
CN115426138A (en) * | 2022-08-14 | 2022-12-02 | 兰州理工大学 | LonTalk-SA protocol authentication method |
Also Published As
Publication number | Publication date |
---|---|
WO1999027678A2 (en) | 1999-06-03 |
DE69828809T2 (en) | 2005-12-22 |
DE69828809D1 (en) | 2005-03-03 |
FI974341A0 (en) | 1997-11-26 |
AU1240499A (en) | 1999-06-15 |
CA2310329A1 (en) | 1999-06-03 |
EP1025675B1 (en) | 2005-01-26 |
WO1999027678A3 (en) | 1999-08-12 |
EP1025675A2 (en) | 2000-08-09 |
ATE288159T1 (en) | 2005-02-15 |
FI974341A (en) | 1999-05-27 |
CN1280727A (en) | 2001-01-17 |
JP2001524777A (en) | 2001-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7542569B1 (en) | Security of data connections | |
US5515441A (en) | Secure communication method and apparatus | |
US7020778B1 (en) | Method for issuing an electronic identity | |
US5450493A (en) | Secure communication method and apparatus | |
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
JP3816337B2 (en) | Security methods for transmission in telecommunications networks | |
US7840806B2 (en) | System and method of non-centralized zero knowledge authentication for a computer network | |
US7076657B2 (en) | Use of short message service (SMS) for secure transactions | |
US7352866B2 (en) | Enhanced subscriber authentication protocol | |
US5440635A (en) | Cryptographic protocol for remote authentication | |
US6931528B1 (en) | Secure handshake protocol | |
JP4002035B2 (en) | A method for transmitting sensitive information using unsecured communications | |
US20030115452A1 (en) | One time password entry to access multiple network sites | |
US20150101029A1 (en) | Methods and apparatus for security over fibre channel | |
WO1998037661A1 (en) | Apparatus and method for authentification and encryption of a remote terminal over a wireless link | |
CN110020524B (en) | Bidirectional authentication method based on smart card | |
CN1371565A (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
EP1079565A2 (en) | Method of securely establishing a secure communication link via an unsecured communication network | |
WO2022135391A1 (en) | Identity authentication method and apparatus, and storage medium, program and program product | |
US20030037241A1 (en) | Single algorithm cipher suite for messaging | |
Lin et al. | Authentication protocols with nonrepudiation services in personal communication systems | |
WO2022135383A1 (en) | Identity authentication method and apparatus | |
Karati et al. | QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks | |
Godfrey | A Comparison of Security Protocols in a Wireless Network Environment | |
CN115580403B (en) | PKI-based computing node access control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NOKIA SIEMENS NETWORKS OY, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA NETWORKS OY;REEL/FRAME:020543/0738 Effective date: 20070907 |
|
AS | Assignment |
Owner name: NOKIA SIEMENS NETWORKS OY, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:020837/0781 Effective date: 20070913 |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: NOKIA SOLUTIONS AND NETWORKS OY, FINLAND Free format text: CHANGE OF NAME;ASSIGNOR:NOKIA SIEMENS NETWORKS OY;REEL/FRAME:034294/0603 Effective date: 20130819 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210602 |